Privileged analytics system

A Shmueli, A Dulkin, S Yair, A Weiss - US Patent 9,712,548, 2017 - Google Patents
A computer-implemented method for determining whether a computer network is
compromised by unauthorized activity on the computer network. The computer-implemented …

Systems and methods for detection of anomalous network behavior

R Bernstein, A Dulkin - US Patent 9,565,203, 2017 - Google Patents
There is provided a computer implemented method for detecting anomalous behavior in a
network, comprising: receiving data representing at least one network activity, each network …

Anomaly detection in groups of network addresses

R Bernstein, A Dulkin, A Weiss, A Shmueli - US Patent 9,497,206, 2016 - Google Patents
--------Learn model: represented by the node. Nodes having respective ripeness scores
within a specified range are classified as ripe nodes, and may be indicative of normal …

Method and computer device to control software file downloads

MJ Austin - US Patent 9,589,131, 2017 - Google Patents
A computer device includes a download unit which downloads one or more files into a
storage device. A file logging unit records a resource locator identifying a source network …

Systems and methods for true privilege application elevation

B Hibbert, G Iverson, J Lustig-Rusch… - US Patent App. 15 …, 2017 - Google Patents
A method comprising storing a privilege rule, detecting an instruction to execute an
application, and determining whether execution of the application requires an elevated …

Temporarily providing higher privileges for computing system to user identifier

JJ Auvenshine, BJ Klingenberg, N Garimella… - US Patent …, 2015 - Google Patents
A root user identifier of a computing system is disabled. Thereafter, and in response to
determining that a problem with the computing system requires root privileges to the …

Method and system for detecting unauthorized access to and use of network resources

A Dulkin, S Yair, R Adar - US Patent 9,876,804, 2018 - Google Patents
Methods and systems are disclosed for detecting unauthorized actions associated with
network resources, the actions including access to the resource and activity associated with …

Systems and methods for process self-elevation

K Meyer, G Chirhart, A Marks - US Patent 8,442,960, 2013 - Google Patents
A computer-implemented method for elevating privileges for a process may comprise: 1)
determining that the process requires elevated privileges for proper execution, 2) attempting …

Modernization of legacy applications using dynamic icons

CF Lategan - US Patent 9,304,754, 2016 - Google Patents
Methods, systems, and techniques for automatically allocating and dynamically determining
icons for placement on legacy task output as part of modernizing such tasks are provided …

Systems and methods for controlling privileged operations

A Kolishchak - US Patent 10,977,361, 2021 - Google Patents
Systems and methods for controlling privileged operations. The system and method may
comprise the steps of: provid ing a kernel module having a kernel authorization subsys tem …